Visible to the public Game theoretic study on blockchain based secure edge networks

TitleGame theoretic study on blockchain based secure edge networks
Publication TypeConference Paper
Year of Publication2017
AuthorsXu, D., Xiao, L., Sun, L., Lei, M.
Conference Name2017 IEEE/CIC International Conference on Communications in China (ICCC)
Date PublishedOct. 2017
PublisherIEEE
ISBN Number978-1-5386-4502-4
Keywordsattack motivation, blockchain, blockchain security, blockchain security game, blockchain-based secure edge networks, cloud computing, data privacy, edge network, edge server, game theoretic security, game theoretic study, game theory, Games, human factors, illegal security gains, Metrics, mobile device, Mobile handsets, Nash equilibria, NE, Network security, performance evaluation, Predictive Metrics, pubcrawl, punishment scheme, resilience, Resiliency, Scalability, security, Servers
Abstract

Blockchain has been applied to study data privacy and network security recently. In this paper, we propose a punishment scheme based on the action record on the blockchain to suppress the attack motivation of the edge servers and the mobile devices in the edge network. The interactions between a mobile device and an edge server are formulated as a blockchain security game, in which the mobile device sends a request to the server to obtain real-time service or launches attacks against the server for illegal security gains, and the server chooses to perform the request from the device or attack it. The Nash equilibria (NEs) of the game are derived and the conditions that each NE exists are provided to disclose how the punishment scheme impacts the adversary behaviors of the mobile device and the edge server.

URLhttps://ieeexplore.ieee.org/document/8330529/
DOI10.1109/ICCChina.2017.8330529
Citation Keyxu_game_2017